440
edits
(Clean up notice. Focused too much on security, and 2FA do have privacy problems that leaks your phone identifier or ...) |
(commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning) |
||
Line 1:
{{Warning|1='''All the advice given below is followed at your own risk
<!--{{Warning|'''The page needs to be cleaned up.''' <br>Reasons:<br>This page focuses on security such as 2FA and passswords more than privacy. Out-of-scope content should be removed or replaced. }}-->
{{TOC right}}
Purpose of this guide is to help victims of technological domestic abuse resist surveillance and recover from privacy or security compromise by perpetrators of abuse, whether romantic, familial or otherwise. <br />Technologically savvy perpetrators have more options than ever before to keep tabs on their victims, take away control and agency and continue abuse from afar. We will try to give you the tools and knowledge to resist technological aspects of the abuse, and once you're able to leave the abusive situation, recover from the privacy compromise.
|